pwwl / tep-attack-simulatorLinks
ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"
☆15Updated 2 years ago
Alternatives and similar repositories for tep-attack-simulator
Users that are interested in tep-attack-simulator are comparing it to the libraries listed below
Sorting:
- This is the Network Flow Generator for ICSSIM☆15Updated 4 months ago
- An Adaptive Misuse Detection System☆46Updated last year
- Subdomains scanner Spider☆13Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- PowerShell Script Analyzer☆70Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- A co-simulation framework for reasearching cybersecurity in power grids.☆24Updated 3 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- ☆31Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Web Path Finder☆60Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- Simple Latest CVE Collector Written in Python☆59Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆40Updated 2 years ago